cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 302 Documents
Incident and Traffic-Bottleneck Detection Algorithm in High-Resolution Remote Sensing Imagery Sayed M.M. Kahaki; Md. Jan Nordin; Amir H. Ashtari
Journal of ICT Research and Applications Vol. 6 No. 2 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.2.4

Abstract

One  of  the  most  important  methods  to  solve  traffic  congestion  is  to detect the incident state of a roadway. This paper describes the development of a method  for  road  traffic  monitoring  aimed  at  the  acquisition  and  analysis  of remote  sensing  imagery.  We  propose  a  strategy  for  road  extraction,  vehicle detection  and incident detection  from remote sensing imagery using techniques based on neural networks, Radon transform  for angle detection and traffic-flow measurements.  Traffic-bottleneck  detection  is  another  method  that  is  proposed for recognizing incidents in both offline and real-time mode. Traffic flows and incidents are extracted from aerial images of bottleneck zones. The results show that the proposed approach has a reasonable detection performance compared to other methods. The best performance of the learning system was a detection rate of 87% and a false alarm rate of less than 18% on 45 aerial images of roadways. The performance of the traffic-bottleneck detection  method had a detection rate of 87.5%.
Development of a Two-Channel Simultaneous Photoplethysmography Recording System Kim Soon Chong; Kok Beng Gan; Mohd. Ali Mohd. Alauddin
Journal of ICT Research and Applications Vol. 6 No. 2 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.2.5

Abstract

Multi-site photoplethysmograph  (PPG) recording enables researchers to study the vascular and hemodynamic  properties of human subjects. Currently, there  is  no  commercial  system  available  in  the  market  to  perform  either  one channel or multi-channel PPG recording. PPG is an optoelectronic technique that measures  changes  in  blood  volume  associated  with  cardiac  contraction.  The measurements  can  be  obtained  from  fingertips,  ear  lobes  and toes  due  to  their low absorption and high degree of vasculature. The main objective of this project is to develop a two-channel simultaneous PPG recording system to acquire PPG signals  from  two  different  physiological  sites  using  a  Nellcor  equivalent  PPG probe.  MATLAB  software  was  used  during  the  development  phase  to  ensure rapid prototyping. The experiment results show that there was no inter -channel delay in the developed two-channel PPG system. Our preliminary results show that the delays between the left and the right arm were from 4 to 12 ms in three healthy random subjects. The system is portable, powered by universal serial bus (USB) and allows the user to do the PPG data acquisition in a clinical setting.
Performance Comparison of Several Pre-Processing Methods in a Hand Gesture Recognition System based on Nearest Neighbor for Different Background Conditions Regina Lionnie; Ivanna K. Timotius; Iwan Setyawan
Journal of ICT Research and Applications Vol. 6 No. 3 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.3.1

Abstract

This paper presents a performance analysis and comparison of several pre-processing  methods  used  in  a  hand  gesture  recognition  system.  The  preprocessing methods are based on the combinations ofseveral image processing operations,  namely  edge  detection,  low  pass  filtering,  histogram  equalization, thresholding and desaturation. The hand gesture recognition system is designed to classify an input image into one of six possibleclasses. The input images are taken with various background conditions. Our experiments showed that the best result is achieved when the pre-processing method consists of only a desaturation operation, achieving a classification accuracy of up to 83.15%.
Performance of Wavelet-based Multiresolution Motion Estimation for Inbetweeningin Old Animated Films Dwi Ratna Sulistyaningrum; Mochamad Hariadi; Mauridhi Hery Purnomo
Journal of ICT Research and Applications Vol. 6 No. 3 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.3.2

Abstract

This  paper  investigates the  performance  of  wavelet-based multiresolution  motion  estimation (MRME)  for  inbetweening  in  old  animated films  using  three different  MRME  schemes.  The  three  schemes  are:  coarse-to fine with a wavelet-based MRME, one of Zhang's MRMEs, and an MRME in the spatial domain.  In order to make a performance comparison of these MRME  schemes,  two  video  sequences were  used  for  a  simulation.  The  experimental results  show  that  the  coarse-to-fine  method  performed  better  than  Zhang's  MRME  and  the  MRME in the spatial domain. The evaluation results  on block size 9x9 indicate that the coarse-to-fine method had an average peak signal-to-noise ratio (PSNR) of  23.48 dB for the first sequence and 29.84 for the second sequence.
Edge Connectivity Problems in Telecommunication Networks Antonius Suhartomo
Journal of ICT Research and Applications Vol. 6 No. 3 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.3.3

Abstract

If a communication network N with n stations has every station linked with  at  least [n/2] other  stations,  then the  edge-connectivity  of  N  equals  its minimum  degree.  Also, in  general,  this  limitation  is  stated  to  be  the  best possibility,  as  was  proved  by  Chartrand  in  1966.  A  more developed  notion  of edge-connectivity  is  introduced, which  is  called  k-component  order  edge connectivity. It  is the minimum number of edges required to be removed so that the order of each disconnected component is less than k.
Automatic Tailored Multi-Paper Summarization based on Rhetorical Document Profile and Summary Specification Masayu Leylia Khodra; Dwi Hendratmo Widyantoro; E. Aminudin Aziz; Bambang Riyanto Trilaksono
Journal of ICT Research and Applications Vol. 6 No. 3 (2012)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2012.6.3.4

Abstract

In  order  to  assist  researchers  in  addressing  time  constraint  and  low relevance  in  using  scientific  articles,  an  automatic  tailored  multi-paper summarization  (TMPS)  is  proposed.  In  this  paper,  we  extend  Teufel's  tailored summary  to  deal  with  multi-papers  and  more  flexible  representation  of  user information needs. Our TMPS extracts Rhetorical Document Profile (RDP) from each paper and  presents a summary based on user information needs.  Building Plan  Language  (BPLAN)  is  introduced  as  a  formalization  of  Teufel's  building plan  and  used  to  represent summary  specification,  which  is  more  flexible representation user information needs. Surface repair is embedded within the BPLAN  for  improving  the  readability  of  extractive summary.  Our  experiment shows that the average performance of RDP extraction module is 94.46%, which promises  high  quality  of  extracts  for  summary  composition.  Generality evaluation  shows  that  our  BPLAN  is  flexible  enough  in  composing  various forms  of summary.  Subjective  evaluation  provides evidence that  surface repair operators can improve the resulting summary readability.
Owner’s Support, IT Sophistication and IT Adoption in Indonesian Manufacturing SMEs Singgih Saptadi; Iman Sudirman; T.M.A Ari Samadhi; Rajesri Govindaraju
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.6

Abstract

The importance of technology, especially information technology (IT), to businesses is widely accepted. But, different from large enterprises, small and medium enterprises (SMEs) with their limited resources adopted IT slowly. Literature on technology adoption suggests that organizational readiness is one of many factors that determine the adoption of technology. This paper relates IT adoption in Indonesian manufacturing SMEs with their IT readiness represented by owners support and IT sophistication they have. In this paper, the variety of IT adoption by SMEs was explored using business process approach. The support from SMEs owner represented by owner’s IT knowledge and resource allocation. IT sophistication included management level supported by IT, IT skill and IT innovativeness of SMEs staff. Three propositions were formulated and explored using data collected from 320 SMEs. Using cluster analysis, these SMEs were classified into five type of IT adoption based on three business focus (supplier, internal and customer): early adoption, internal focus adoption, customer focus adoption, internal-customer focus adoption and balanced adoption. The results suggests wider IT adoption requires greater support from the owner and higher IT sophistication.
Randomized Symmetric Crypto Spatial Fusion Steganographic System Viswanathan Perumal
Journal of ICT Research and Applications Vol. 10 No. 1 (2016)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2016.10.1.2

Abstract

The image fusion steganographic system embeds encrypted messages in decomposed multimedia carriers using a pseudorandom generator but it fails to evaluate the contents of the cover image. This results in the secret data being embedded in smooth regions, which leads to visible distortion that affects the imperceptibility and confidentiality. To solve this issue, as well as to improve the quality and robustness of the system, the Randomized Symmetric Crypto Spatial Fusion Steganography System is proposed in this study. It comprises three-subsystem bitwise encryption, spatial fusion, and bitwise embedding. First, bitwise encryption encrypts the message using bitwise operation to improve the confidentiality. Then, spatial fusion decomposes and evaluates the region of embedding on the basis of sharp intensity and capacity. This restricts the visibility of distortion and provides a high embedding capacity. Finally, the bitwise embedding system embeds the encrypted message through differencing the pixels in the region by 1, checking even or odd options and not equal to zero constraints. This reduces the modification rate to avoid distortion. The proposed heuristic algorithm is implemented in the blue channel, to which the human visual system is less sensitive. It was tested using standard IST natural images with steganalysis algorithms and resulted in better quality, imperceptibility, embedding capacity and invulnerability to various attacks compared to other steganographic systems.
Automatic Segmentation of Indonesian Speech into Syllables using Fuzzy Smoothed Energy Contour with Local Normalization, Splitting, and Assimilation Suyanto Suyanto; Agfianto Eko Putra
Journal of ICT Research and Applications Vol. 8 No. 2 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.2.2

Abstract

This paper discusses the usage of short term energy contour of a speech smoothed by a fuzzy-based method to automatically segment the speech into syllabic units. Two additional procedures, local normalization and postprocessing, are proposed to improve the method. Testing to Indonesian speech dataset shows that local normalization significantly improves the accuracy of fuzzy smoothing. In postprocessing step, the procedure of splitting missed short syllables reduces the deletion errors, but unfortunately it increases the insertion ones. On the other hand, an assimilation of a single consonant segment into its previous or next segment reduces the insertion errors, but increases the deletion ones. The sequential combination of splitting and then assimilation gives quite significant improvement of accuracy as well as reduction of deletion errors, but it slightly increases the insertion ones.
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider Sergey Igorevich Zhurin
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.5

Abstract

A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in  critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.

Page 8 of 31 | Total Record : 302